13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 9: Securing Your <strong>Wireless</strong> <strong>Home</strong> Network<br />

attack on another computer (the bad guys can launch these attacks remotely<br />

using your computer, which makes them that much harder to track down); or<br />

even as source for spam e-mailing.<br />

What we’re getting at here is that you need to take a few steps to secure any<br />

computer attached to the Internet. If you have a broadband (DSL, satellite,<br />

fiber-optic, or cable modem) connection, you really need to secure your computers.<br />

The high-speed, always-on connections that these services <strong>of</strong>fer make<br />

it easier for a cracker to get into your computer. We recommend that you<br />

take three steps to secure your computers from Internet-based security risks:<br />

� Use and maintain antivirus s<strong>of</strong>tware. Many attacks on computers don’t<br />

come from someone sitting in a dark room, in front <strong>of</strong> a computer screen,<br />

actively cracking into your computer. They come from viruses (<strong>of</strong>ten<br />

scripts embedded in e-mails or other downloaded files) that take over<br />

parts <strong>of</strong> your computer’s operating system and do things you don’t want<br />

your computer doing (such as sending a copy <strong>of</strong> the virus to everyone<br />

in your e-mail address book and then deleting your hard drive). Choose<br />

your favorite antivirus program and use it. Keep the virus definition files<br />

(the data files that tell your antivirus s<strong>of</strong>tware what’s a virus and what’s<br />

not) up to date. And for heaven’s sake, use your antivirus program!<br />

� Use a personal firewall on each computer. Personal firewalls are programs<br />

that basically look at every Internet connection entering or exiting<br />

your computer and check it against a set <strong>of</strong> rules to see whether the<br />

connection should be allowed. After you’ve installed a personal firewall<br />

program, wait about a day and then look at the log. You may be shocked<br />

and amazed at the sheer number <strong>of</strong> attempted connections to your computer<br />

that have been blocked. Most <strong>of</strong> these attempts are relatively<br />

innocuous, but not all are. If you have broadband, your firewall may<br />

block hundreds <strong>of</strong> these attempts every day.<br />

We like ZoneAlarm (www.zonealarm.com) for Windows computers as<br />

well as the firewall built into Windows XP Service Pack 2 and Windows<br />

Vista, and we use the built-in firewall on our Mac OS X computers.<br />

� Turn on the firewall functionality in your router. Whether you use a<br />

separate router or one integrated into your wireless access point, it will<br />

have at least some level <strong>of</strong> firewall functionality built in. Turn this function<br />

on when you set up your router or access point. (It’s an obvious<br />

option in the configuration program and may well be turned on by<br />

default.) We like to have both the router firewall and the personal firewall<br />

s<strong>of</strong>tware running on our PCs. It’s the belt-and-suspenders approach,<br />

but it makes our networks more secure.<br />

In Chapter 11, we talk about some situations (particularly when you’re<br />

playing online games over your network) where you need to disable some<br />

<strong>of</strong> this firewall functionality. We suggest that you do this only when you<br />

must. Otherwise, turn on that firewall — and leave it on.<br />

161

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!